Data Security Controls and Compliance
Since you have already read about the importance of an accurate digital asset inventory and the proper categorization of that inventory, you can now look at the protection of said inventory. Chapter 5, Asset and Privacy Protection, discussed the asset life cycle, what a digital asset is, and the importance of the proper classification of a digital asset. In particular, this section will help determine the quantity of resources to apply when securing a given asset. This section deals with how to determine the proper security controls for a given asset at a given classification level and compliance requirement.
Data States
One of the first considerations regarding the protection of any digital asset is the digital asset’s change state —that is, when the asset is being used by an application, when it is in transit over a network, and when it is at rest in storage. Each one of the states has a different control and strategy for...